Preferred Language
Articles
/
qBf2Q44BVTCNdQwCtz9G
Performance enhancement of high degree Charlier polynomials using multithreaded algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Tue Jan 17 2017
Journal Name
International Journal Of Computer Applications
Improving of Photovoltaic Cell Performance by Cooling using Two different Types of Fins
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Neuroquantology
Assessment of Some Enhancement Methods of Renal X-ray Image
...Show More Authors

The study focuses on assessment of the quality of some image enhancement methods which were implemented on renal X-ray images. The enhancement methods included Imadjust, Histogram Equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE). The images qualities were calculated to compare input images with output images from these three enhancement techniques. An eight renal x-ray images are collected to perform these methods. Generally, the x-ray images are lack of contrast and low in radiation dosage. This lack of image quality can be amended by enhancement process. Three quality image factors were done to assess the resulted images involved (Naturalness Image Quality Evaluator (NIQE), Perception based Image Qual

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agriculture And Statistical Science
COMPARISON OF FORECASTING OF THE RISK OF CORONAVIRUS (COVID-19) IN HIGH-QUALITY AND LOW-QUALITY HEALTHCARE SYSTEMS, USING ANN MODELS
...Show More Authors

COVID-19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so helping in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduce

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Effect of Variation of Degree of Saturation with depth on Soil–Concrete Pile Interface in Clayey Soil
...Show More Authors

Bearing capacity of a concrete pile in fine grained cohesive soils is affected by the degree of saturation of the surrounding soil through the contribution of the matric suction. In addition, the embedded depth and the roughness of the concrete pile surface (expressed as British Pendulum Number BPN) also have their contribution to the shear strength of the concrete pile, consequently its bearing capacity. Herein, relationships among degree of saturation, pile depth, and surface roughness, were proposed as a mathematical model expressed as an equation where the shear strength of a pile can be predicted in terms of degree of saturation, depth, and BPN. Rel

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The Awareness Degree of Arabic Language Teachers of the Preparatory Stage for the Requirements of Sustainable Development
...Show More Authors

The objective of the current research is to identify the degree of awareness of the teachers of Arabic language with the requirements of sustainable development. The research sample consisted of (100) male and female teachers of the Arabic language. A 3-likert scale of (71) items grouped into practical and cognitive aspects, five trends for each aspect was designed by the researcher to explore the required data. The results showed that the level of awareness of teachers of the Arabic language was moderate of both the cognitive and practical aspects of sustainable education with means (1.69) and (1.48) respectively. The researcher presented a set of recommendations and suggestions.

View Publication Preview PDF